Apple iPhone Air
From Wiki-IoT
Classification
| Apple iPhone Air | |
|---|---|
| Classification | |
| Grade | A- |
| Calculator version | 1 |
| Classification date | 2025-10-15 |
| Information | |
| Name | Apple Iphone 17 Air |
| Brand by Parent | Apple by Apple |
| Generation | 17th generation |
| Model(s) | iPhone 17 Air |
| Release date | 2025-09-10 |
| Type/Category | Smart phone |
| Website | [www.apple.com] |
| Status | In sale |
| More | |
| Dimensions | 147 × 71 × 7.8 mm |
| Mass | 160 g |
| Operating system | iOS 19 |
| Companion App | Apple Store、Apple Support |
| CPU | Apple A19 Pro (6-core CPU) |
| GPU | Apple 5-core GPU |
| Memory | 12 GB |
| Storage | 256 GB / 512 GB / 1 TB (NVMe) |
| Battery | 3149 mAh |
| Power | ~12.26 Wh |
| Charging | MagSafe and Qi 2 wireless charging, USB-C fast charging |
| Display | 6.5-inch Super Retina XDR OLED, 2736 × 1260, 460 ppi, 120Hz ProMotion, adaptive refresh rate, HDR, Always-On display |
| Camera | Rear: 48 MP wide-angle; Front: 18 MP wide-angle, Center Stage support |
| Sound | Single speaker |
| Connectivity | eSIM, Wi-Fi 7 (802.11 a/b/g/n/ac/ax/be), Bluetooth 6.0, Ultra-Wideband (UWB), Thread, NFC (Card Reader, Express Card), USB-C (USB 2.0, 480 Mbit/s), dual-band GPS (L1, L5), GLONASS, Galileo, QZSS, BeiDou, NavIC |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [1] | Apple's integrated hardware design and Secure Enclave make unauthorized physical modification extremely difficult, limiting this threat to highly sophisticated, nation-state-level attacks. |
| Known vulnerabilities | Very common | [2] | iOS is a high-value target for researchers and attackers alike. Apple consistently finds and patches vulnerabilities, so the discovery of new ones is a very common and expected part of the security lifecycle. |
| Prior attacks | Very common | [3] | The iOS platform is frequently targeted by sophisticated spyware (e.g., Pegasus), phishing, and social engineering attacks. While user-facing malware is less common than on Android, the overall attack attempts are very common. |
| Updatability | Very common | [4] | Apple provides the industry's leading software update policy, offering many years of consistent, timely, and widespread OS and security updates for all supported devices. |
| Category score | 3 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [5] | "Sign in with Apple" provides a secure, privacy-focused authentication method, and the OS fully supports other modern standards for integration with third-party services. |
| Communications | Encrypted with up-to-date encryption | [6] | iOS enforces strong, up-to-date encryption standards like TLS 1.3 for app communications (ATS) and supports the latest standards like WPA3 for Wi-Fi. |
| Storage | Encrypted with up-to-date encryption | [7] | All data on an iPhone is protected by default with file-level encryption (Data Protection), using hardware-backed keys managed by the Secure Enclave. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [8] | iOS provides comprehensive management of the user's Apple ID / iCloud account directly within the settings, including security, payment, and synced services. |
| Authentication | Secure | [9] | Authentication is handled by hardware-level biometric systems (Face ID or Touch ID) and a passcode, with credentials protected within the Secure Enclave. |
| Brute-force protection | Exist | [10] | The device will become disabled for progressively longer periods after multiple incorrect passcode entries, protecting it against brute-force attacks. |
| Event logging | Access event logged | [11] | While local system logs are not user-facing, the Apple ID system logs all critical security events (e.g., new device sign-ins, password changes) and actively notifies the user. |
| Passwords | Require change after setup with complexity requirements | [12] | A passcode is mandatory during device setup, and the system enforces minimum complexity rules (e.g., default is a 6-digit PIN). |
| Category score | 1 | ||
| Grade | A- |
|---|